Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of interested events. Unfortunately, such networks are vulnerable to event fabrication attacks, in which the compromised nodes inject bogus reports into the network, fabricating non-existent events “appearing ” at arbitrary locations. Most existing security solutions to these attacks need to share symmetric keys among sensor nodes. In this paper, we propose a Commutative Cipher based En-route Filtering scheme (CCEF) that drops fabricated reports en-route without symmetric key sharing. In CCEF, the source node establishes a secret association with the base station on a per-session basis, while the intermediate forwar...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract—Sensor networks are vulnerable to false data injection attack and path-based denial of serv...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised no...
In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract—Sensor networks are vulnerable to false data injection attack and path-based denial of serv...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised no...
In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited ...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...